US20070177549A1 - Systems and methods for handoff in wireless network - Google Patents
Systems and methods for handoff in wireless network Download PDFInfo
- Publication number
- US20070177549A1 US20070177549A1 US11/616,448 US61644806A US2007177549A1 US 20070177549 A1 US20070177549 A1 US 20070177549A1 US 61644806 A US61644806 A US 61644806A US 2007177549 A1 US2007177549 A1 US 2007177549A1
- Authority
- US
- United States
- Prior art keywords
- target
- eapow
- message
- serving
- channel
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 102
- 238000004891 communication Methods 0.000 claims abstract description 43
- 239000000523 sample Substances 0.000 claims description 39
- 230000004044 response Effects 0.000 claims description 29
- 238000009434 installation Methods 0.000 claims description 21
- 239000000872 buffer Substances 0.000 claims description 17
- 238000010200 validation analysis Methods 0.000 claims description 6
- 230000001052 transient effect Effects 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 20
- 238000012546 transfer Methods 0.000 description 14
- 230000005540 biological transmission Effects 0.000 description 13
- 238000013507 mapping Methods 0.000 description 11
- 102000036770 Islet Amyloid Polypeptide Human genes 0.000 description 8
- 108010041872 Islet Amyloid Polypeptide Proteins 0.000 description 8
- PLOPBXQQPZYQFA-AXPWDRQUSA-N amlintide Chemical compound C([C@@H](C(=O)NCC(=O)N[C@@H](C)C(=O)N[C@@H]([C@@H](C)CC)C(=O)N[C@@H](CC(C)C)C(=O)N[C@@H](CO)C(=O)N[C@@H](CO)C(=O)N[C@@H]([C@@H](C)O)C(=O)N[C@@H](CC(N)=O)C(=O)N[C@@H](C(C)C)C(=O)NCC(=O)N[C@@H](CO)C(=O)N[C@@H](CC(N)=O)C(=O)N[C@@H]([C@@H](C)O)C(=O)N[C@@H](CC=1C=CC(O)=CC=1)C(N)=O)NC(=O)[C@H](CC(N)=O)NC(=O)[C@H](CC(N)=O)NC(=O)[C@H](CO)NC(=O)[C@H](CO)NC(=O)[C@H](CC=1NC=NC=1)NC(=O)[C@@H](NC(=O)[C@H](CC(C)C)NC(=O)[C@H](CC=1C=CC=CC=1)NC(=O)[C@H](CC(N)=O)NC(=O)[C@H](C)NC(=O)[C@H](CC(C)C)NC(=O)[C@H](CCCNC(N)=N)NC(=O)[C@H](CCC(N)=O)NC(=O)[C@@H](NC(=O)[C@H](C)NC(=O)[C@H]1NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H](C)NC(=O)[C@H]([C@@H](C)O)NC(=O)[C@H](CC(N)=O)NC(=O)[C@@H](NC(=O)[C@@H](N)CCCCN)CSSC1)[C@@H](C)O)C(C)C)C1=CC=CC=C1 PLOPBXQQPZYQFA-AXPWDRQUSA-N 0.000 description 8
- 230000008569 process Effects 0.000 description 5
- 238000013459 approach Methods 0.000 description 3
- UNXNGGMLCSMSLH-UHFFFAOYSA-N dihydrogen phosphate;triethylazanium Chemical compound OP(O)(O)=O.CCN(CC)CC UNXNGGMLCSMSLH-UHFFFAOYSA-N 0.000 description 2
- 239000000463 material Substances 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000007423 decrease Effects 0.000 description 1
- 238000009429 electrical wiring Methods 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 230000002123 temporal effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0055—Transmission or use of information for re-establishing the radio link
- H04W36/0058—Transmission of hand-off measurement information, e.g. measurement reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/16—Performing reselection for specific purposes
- H04W36/18—Performing reselection for specific purposes for allowing seamless reselection, e.g. soft reselection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W36/00—Hand-off or reselection arrangements
- H04W36/0005—Control or signalling for completing the hand-off
- H04W36/0055—Transmission or use of information for re-establishing the radio link
Definitions
- the invention relates to wireless LAN (local area network), and more particularly, to systems and methods for smooth handoff in secured wireless LANs.
- a mobile node In a wireless LAN, a mobile node (MN) associates with an access point (AP) and exchanges data and voice packets with a corresponding node (CN) via the associated AP.
- MN mobile node
- AP access point
- CN node
- a handoff procedure is performed to transfer an ongoing call or data session from the associated AP to the other AP (referred to as the target AP).
- the handoff procedure requires time to perform authentication, authorization and assignment of data encryption key for the target AP. As a result, some packets including data and voice packets may be lost during the handoff procedure, reducing the quality of data or voice transmission.
- a method for handoff in a secured network comprises the following steps.
- Channels are periodically switched between a first channel and one of multiple other channels during handoff to utilize the first channel to transmit/receive multiple packets to/from a corresponding node (CN) via a serving access point (AP) which the MN has associated with and utilize one of the other channels to perform a handoff procedure to a target AP which is to be associated with the MN.
- the first channel is switched to in multiple duty cycles of packet intervals and the other channels are switched to in multiple sleep cycles of packet intervals, where the duty cycles and the sleep cycles are interleaved.
- a method for handoff in a secured network comprises the following steps.
- the MN is associated with a serving access point (AP) to transmit/receive multiple packets to/from a corresponding node (CN) using a first MAC (medium access control) address.
- the MN performs a handoff procedure to a target AP by employing a second MAC address. Once the handoff procedure is completed, the mobile node transmits/receives packets to/from the CN via the target AP.
- a system for smooth handoff in a secured network comprises a communication unit and a processor coupled to the communication unit.
- the processor periodically directs the communication unit to switch channels between a first channel and one of a plurality of other channels during handoff to utilize the first channel to transmit/receive multiple packets to/from a CN via a serving AP which the MN has associated with and utilize one of the other channels to perform the handoff procedure to a target AP which is to be associated with the MN.
- the first channel is switched to in multiple duty cycles of packet intervals and the other channels are switched to in multiple sleep cycles of packet intervals, where the duty cycles and the sleep cycles are interleaved.
- a system for smooth handoff in a secured network comprises a communication unit and a processor coupled to the communication unit.
- the processor associates with a serving AP to transmit/receive multiple packets to/from a CN via the communication unit using a first MAC address, and performs a handoff procedure to a target AP by employing a second MAC address. Once the handoff procedure is completed, the mobile node transmits/receives packets to/from the CN via the target AP.
- FIG. 1 a is a diagram of a mobile node being moved in an overlapping area between two cells respectively managed by two access points;
- FIG. 1 b is a diagram illustrating signal strength variation during the movement of the mobile node
- FIG. 2 is a sequence diagram illustrating an exemplary IEEE 802.1x handoff procedure using EAP-MD5 (extensible authentication protocol-message digest 5);
- FIG. 3 is a sequence diagram illustrating an exemplary IEEE 802.11i handoff procedure using EAP-TLS (extensible authentication protocol-transport layer security) plus 4-way handshake;
- EAP-TLS extensible authentication protocol-transport layer security
- FIG. 4 is a sequence diagram illustrating an exemplary IEEE 802.11f plus IEEE 802.11i handoff procedure
- FIG. 5 is a diagram of a hardware environment of an MN in which embodiments of the present invention may be implemented
- FIG. 6 is a timing diagram for uplink and downlink of voice over IP (VoIP) packet exchanges according to an exemplary PS-Poll transmission scheme
- FIG. 7 is a diagram illustrating an active scan according to an embodiment of the present invention.
- FIG. 8 is a diagram illustrating portions of a 4-way handshake according to an embodiment of the present invention.
- FIG. 9 is a sequence diagram illustrating an example of channel switching in the power saving mode (PSM) according to an embodiment of the present invention.
- FIG. 10 is an exemplary IEEE 802.1x handoff procedure using EAP-MD5 when employing bounded delay channel switching (BDCS) according to an embodiment of the present invention
- FIG. 11 is an exemplary IEEE 802.1x handoff procedure using EAP-MD5 when employing BDCS and dual-MAC switching (DMS) according to an embodiment of the present invention
- FIG. 12 is an exemplary IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS according to an embodiment of the present invention
- FIG. 13 is an exemplary IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS and DMS according to an embodiment of the present invention
- FIG. 14 is an exemplary IEEE 802.11f plus IEEE 802.11i handoff procedure when employing BDCS according to an embodiment of the present invention.
- FIG. 15 is an exemplary IEEE 802.11f plus IEEE 802.11i handoff procedure when employing BDCS and DMS according to an embodiment of the present invention.
- FIG. 1 a is a diagram of a mobile node MN, such as a mobile phone, a notebook computer, a personal digital assistant (PDA) or the like, being moved in an overlapping area between cells C 1 and C 2 respectively managed by access points AP 1 and AP 2 .
- FIG. 1 b is a diagram of signal strength variation during the movement of the mobile node MN shown in FIG. 1 a.
- a strength of a signal from AP 1 decreases, and conversely, a strength of a signal from AP 2 increases.
- the signal strength is typically measured in the form of signal-to-noise ratio (SNR) by the mobile node MN.
- a handoff procedure is activated to transfer an ongoing call or a communication session from AP 1 to AP 2 while, for example, the signal strength of the signal from AP 1 is lower than a pre-defined threshold T h .
- AP 1 also called a serving AP
- AP 2 also called a target AP
- the handoff procedure typically comprises a channel scan to find an AP with the maximum signal strength (the target AP), an open system authentication, and an association with the target AP.
- FIG. 2 is a sequence diagram illustrating an exemplary handoff procedure based on IEEE 802.1x and EAP-MD5 (extensible authentication protocol-message digest 5).
- EAP-MD5 extensible authentication protocol-message digest 5
- the entire sequence may be divided into four stages, including data transfer P 21 , scan and authentication P 23 , re-association P 25 and EAP authentication P 27 .
- data transfer stage P 21 when an MN detects that received signals from a serving AP are not strong enough, it activates a handoff procedure with IEEE 802.1x enabled.
- packets such as data, VoIP (voice over IP) or other packets, are transmitted/received to/from a corresponding node (CN).
- the next AP to be associated with is discovered and authenticated in the scan and authentication stage P 23 .
- the MN sequentially switches to channels other than a channel utilized to communicate with the serving AP, sends probe requests via the other channels and receives probe responses via the other channels, and determines the next AP to be associated with (the target AP) according to signal strengths of the received probe responses. After determining the target AP, the MN sends messages to the target AP to initiate the authentication process.
- the MN when the MN switches to other channels to perform the active scan, no data or voice packet can be transmitted/received to/from the CN via the currently associated AP, resulting in packet delay and loss.
- the MN In the re-association stage P 25 , after the MN is successfully authenticated by the target AP, the MN establishes a link-layer connection to the target AP (the process is also called a re-association process). Although the MN establishes a link-layer connection with the target AP in the re-association stage P 25 , the MN still cannot receive/transmit packets from/to the CN via the target AP because the MN is not authenticated by using IEEE 802.1x yet.
- the MN and an authentication server (referred to as the AS, which is an entity that provides authentication services for the authenticator) authenticate each other by EAPOW (extensible authentication protocol over wireless).
- the AS authenticates the MN
- the AS transmits a data packet comprising “RADIUS-Access Accept” message to the target AP to notify it that the MN is successfully authenticated.
- the target AP activates an authorized port, and transmits a data packet comprising “EAPOW success” message to the MN to notify it that the MN is successfully authenticated.
- the handoff is completed and packets can be transmitted/received to/from the CN via the target AP.
- the handoff latency for the handoff based on IEEE 802.1x using EAP-MD5 is the sum of the time required for the scan, authentication, re-association and EAP authentication processes, i.e., T scan +T auth +T asso +T EAP .
- FIG. 3 is a sequence diagram illustrating an exemplary handoff procedure with IEEE 802.1x and IEEE 802.11i enabled and using EAP-TLS (extensible authentication protocol-transport layer security) plus 4-way handshake.
- EAP-TLS extensible authentication protocol-transport layer security
- the entire sequence may be divided into four stages, including data transfer P 31 , scan and authentication P 33 , re-association P 35 , and EAP authentication plus 4-way handshake P 37 .
- the data transfer stage P 31 , the scan and authentication stage P 33 , and the re-association stage P 35 may be understood by referring to the descriptions of data transfer stage P 21 , the scan and authentication stage P 23 , and the re-association stage P 25 of FIG.
- the MN and the AS authenticate each other using EAP-TLS and the AS generates a pairwise master key (PMK).
- the AS subsequently transmits the generated PMK to the MN and the target AP in a secure way.
- the MN performs a 4-way handshake with the target AP to generate a pairwise transient key (PTK) from the PMK.
- the PTK changes periodically and is employed to encrypt and decrypt WLAN link-layer frames.
- the PTK is asset of keying materials containing the cryptographic keys for secure handshake and data transmissions, including the temporal key (TK), EAPOL-key confirmation key (KCK), and EAPoL-key encryption key (KEK).
- Handshaking messages are encapsulated in the IEEE 802.1x EAPoL-Key format, and are protected against man-in-the-middle attacks.
- the target AP start by sending a random nonce, called “ANonce”, to the MN.
- the MN After receiving the message, the MN generates another random nonce, called “SNonce”.
- SNonce Another random nonce
- These two random nonce and shared PMK are then used to produce the PTK.
- the MN replies by sending message 2 with the SNonce to the target AP, which is protected by MIC (message integrity code).
- the target AP generates the PTK in the same way as the MN and verifies the MIC.
- the target AP sends message 3 to notify the MN of the installation of the PTK after successfully verifying the MIC. Finally, the MN replies to the target AP with message 4 to confirm the installation of the PTK. As a result, new keying materials are synchronized and used by both the MN and the target AP.
- the handoff latency for the IEEE 802.1x handoff using EAP-TLS plus 4-way handshake is the sum of the time required for the scan, authentication, re-association, EAP authentication and 4-way handshake processes, i.e., T Scan +T auth +T asso +T EAP-TLS +T 4way .
- FIG. 4 is a sequence diagram illustrating an exemplary handoff procedure with IEEE 802.11f and IEEE 802.11i enabled. This is not prior art for purposes of determining the patentability of the invention and merely shows problems found by the present inventors.
- the entire sequence may be divided into four stages, including data transfer P 41 , scan and authentication P 43 , re-association P 45 , and 4-way handshake P 47 .
- the data transfer stage P 41 and the scan and authentication stage P 43 may be understood by referring to the descriptions of data transfer stage P 21 and the scan and authentication stage P 23 of FIG. 2 .
- the target AP transmits a data packet comprising a “Move-Notify” message to the serving AP to notify it that the MN prepares to disconnect from the serving AP. Subsequently, the serving AP transmits a data packet comprising a “Move-Response” message to the target AP.
- the “Move-Response” message further provides a previously acquired PMK, enabling the target AP to continue the subsequent 4-way handshake without further EAP authentication.
- the MN and the target AP proceed to the 4-way handshake described earlier with reference to FIG. 3 .
- the handoff latency for the IEEE 802.11f plus IEEE 802.11i handoff is T scan +T auth +T asso +T 4way .
- FIG. 5 is a schematic diagram of the hardware structure of a mobile node in which handoff methods according to embodiments of the present invention may be implemented.
- the MN 500 comprises a communication unit 501 , a microphone 502 , a speaker 503 , an antenna 504 , a processor 505 , memory 506 , storage media 513 , a display device 514 , a keypad controller 530 and a keypad 531 .
- the communication unit 501 communicates with APs via the antenna 504 when connecting to a wireless network, such as a wireless LAN (local area network) or the like.
- the processor 505 is connected to the communication unit 501 , memory 506 , storage media 513 , display device 514 , and keypad controller 530 via various bus architectures.
- the conventional MN only configures a single MAC (medium access control) address, and an MAC address can only been associated with one AP in a subnet.
- the target AP After the conventional MN associates or re-associates with a target AP, the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOVE-notify” packet to notify the serving AP that the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN.
- Association with the target AP indicates that the target AP had never been associated with the MN.
- Re-association with the target AP indicates that the target AP had been associated with the MN before.
- the MN 500 may configure two MAC addresses in a single WLAN interface, and such configuration may be implemented in the MAC firmware, called dual-MAC switching (DMS).
- DMS dual-MAC switching
- the MN 500 uses different MAC addresses to separately communicate with the serving and target APs. Therefore, when these two APs are located in the same subnet, the MN 500 still can switch between serving and target APs with two different MACs and maintain both link-layer and network connections with the two APs simultaneously during a handoff procedure.
- Packets such as data, VoIP or other packets are transmitted periodically, with for example 10 ms or 30 ms packet intervals.
- One packet interval may be used for one packet transmission, and an MN typically spends a short period, called a duty cycle, to transmit or receive one packet, and stays idle before initiation of the next packet communication. Therefore, an MN can experience a period of free time, called a sleep cycle, between two packet exchanges. That is, each packet interval is composed of one duty cycle and one sleep cycle.
- FIG. 6 is a timing diagram for uplink and downlink of VoIP packet exchanges according to an exemplary PS-Poll transmission scheme described in Chen et. al., “Power Management for VoIP over IEEE 802.11 WLAN,” IEEE Wireless Communication and Networking ( WCNC ), March 2004.
- the PS-Poll transmission scheme adopts the power saving mode (PSM) defined in the IEEE 802.11 standard to transmit and receive packets in WLANs.
- PSM power saving mode
- An MN first notifies the serving AP that it is entering the PSM, and then stays in the WLAN doze state. If the MN has an uplink packet to transmit, it wakes up and sends the packet.
- the MN After receiving an acknowledgement frame for the uplink packet form the serving AP, comprising information indicating that some data is buffered by the serving AP, the MN sends a PS-Poll frame to retrieve the downlink packet buffered on the serving AP. Finally, the MN receives and acknowledges the downlink packet.
- Another transmission scheme is automatic power saving delivery (APSD) defined in the IEEE 802 .lle. Still another transmission scheme is described below.
- PSM power saving mode
- the MN Before receiving a buffered downlink packet from the CN, the MN transmits a re-association request comprising a PSM (power saving mode) flag being “false” to the serving AP to notify the serving AP that the MN is awake and ready to receive buffered downlink packets.
- PSM power saving mode
- the MN transmits a re-association request comprising a PSM flag being “true”.
- sleep cycles can be provided between two packet exchange periods.
- the uplink and downlink packets are transmitted and received periodically, and the period (the packet interval) is denoted T i .
- the MN spends the length of a duty cycle, denoted T dc , to transmit uplink and receive downlink packets in each period via a channel associated with a serving AP.
- the MN uses the sleep cycles, denoted T i -T dc , to switch to one of the other channels and to perform scan, association, re-association, authentication, 4-way handshake or other operations with an AP other than the serving AP, before switching back to the channel associated with the serving AP.
- BDCS bounded delay channel switching
- the processor of the MN spends the length of a duty cycle to transmit uplink and receive downlink packets in each period via the communication unit (e.g. 501 of FIG. 5 ).
- the processor uses the sleep cycles to switch to one of the other channels and to perform scan, association, re-association, authentication, 4-way handshake or other operations with an AP other than the serving AP via the communication unit, before switching back to the channel associated with the serving AP.
- an MN scans each channel in sleep cycles.
- the processor e.g. 505 of FIG. 5
- a communication unit e.g. 501 of FIG. 5
- FIG. 7 is a diagram illustrating an example of an active scan using BDCS.
- the MN e.g. 500 of FIG. 5
- the MN switches to and scans another channel, such as the sixth channel, by sending a probe request and waiting for probe responses from APs in the other channel.
- the MN switches back to the first channel to transmit and receive packets with the serving AP again.
- the period that the MN can stay in another channel is T i -T dc -2xT s , where T s denotes the channel switching time.
- Two parameters may be configured, including a maximum probe time T max and a minimum probe time T min .
- the minimum probe time is the minimum waiting time for a probe request without getting any probe response.
- the MN waits for the maximum probe time to collect all APs' responses in the same channel.
- the length of a sleep cycle is long enough to scan at least one channel, i.e. sending a probe request and receiving at least one probe response when at least one active AP is present in the scanned channel.
- the MN determines the next AP to be associated with (i.e. the target AP) according to the received probe responses.
- the target AP may be the AP that sent a probe response with the strongest signal strength.
- the MN performs open authentication with the target AP during sleep cycles.
- the processor of the MN e.g. 505 of FIG. 5
- the communication unit e.g. 501 of FIG. 5
- the MN may send an authentication request to the target AP, receive an authentication response comprising validation information from the target AP and determine whether the target AP is authenticated by inspecting the validation information.
- an MN sends an association or re-association request informing the target AP that association or re-association with the target AP is initiated, and receives an association or re-association response from the target AP in sleep cycles.
- the processor e.g. 505 of FIG. 5
- an MN may use another MAC address, different from the MAC address which has been used to associate the MN with the serving AP, to associate or re-associate with the target AP.
- the MN sends an association or re-association request comprising a different MAC address, and as a result, the serving AP will not be forced to de-associate from the MN.
- Using two different MAC addresses to communicate with the serving and target APs maintains both connections with the two APs simultaneously.
- the MN may inform the target AP that the MN is entering the power saving mode (PSM). Then, the target AP starts to buffer messages and packets to the MN.
- the MN can send request messages in one sleep cycle and retrieve response messages by sending a polling message to the target AP in the subsequent sleep cycles during the described EAP authentication stage (e.g. P 27 of FIG. 2 ), EAP authentication plus 4-way handshake stage (e.g. P 37 of FIG. 3 ) or 4-way handshake stage (e.g. P 47 of FIG. 4 ).
- the target AP is informed that the MN has entered PSM after association or re-association with the target AP, and the target AP buffers an EAPOW request message, an EAPOW success message, an EAPOW message with “ANonce”, and/or an EAPOW message notification of installation of the PTK during the EAP authentication and/or 4-way handshake.
- the buffered message is sent to the MN when the target AP receives a polling message from the MN.
- FIG. 8 is a diagram illustrating portions of an exemplary 4-way handshake in which an MN (e.g. 500 of FIG. 5 ) actively retrieves messages from a target AP and performs a 4-way handshake with the target AP using another MAC address.
- MN e.g. 500 of FIG. 5
- the full IEEE 802.1x authentication and IEEE 802.11i 4-way handshake in sleep cycles using another MAC address may be understood from this example.
- the MN may also inform a serving AP that the MN is entering the PSM to prevent loss of incoming packets. Then, the serving AP starts to buffer packets to the MN.
- FIG. 9 is a sequence diagram illustrating an exemplary channel switching in PSM. Before retrieving the buffered VoIP packets, the MN transmits a data packet comprising a “PS-Poll” message (i.e. a polling message) indicating that the MN is ready to receive the buffered packets.
- a PS-Poll i.e. a polling message
- an MN sends an EAPOW start message, an EAPOW response message, an EAPOW message with “SNonce”, an EAPOW message notification of installation of the PTK, or combinations of the above, and receives an EAPOW request message, an EAPOW success message, an EAPOW message with “ANonce”, an EAPOW message notification of installation of the PTK from the target AP, or combinations of the above, in sleep cycles.
- the processor e.g. 505 of FIG.
- the original connection is maintained after associating or re-associating with the target AP.
- the MN can receive downlink packets from the CN and transmit uplink packets via the original channel using a first MAC address in duty cycles, and mutually authenticate the MN and the target AP using a second MAC address in sleep cycles.
- a switch or a router (which is responsible for transferring packets from the CN to the serving AP or the target AP) stores an MAC address to IP address mapping table originally comprising information indicating that an IP address owned by the MN has mapped to the first MAC address, enabling the switch or router to discover the first MAC address and transfer downlink packets to the MN via the serving AP governing the first MAC address.
- EAP authentication stage e.g. P 27 of FIG. 2
- EAP authentication plus 4-way handshake stage e.g. P 37 of FIG. 3
- 4-way handshake stage e.g. P 47 of FIG.
- the MN either transmits an ARP (address resolution protocol) request message or the first out-going packet to update the MAC address to IP address mapping table indicating that an IP address owned by the MN has mapped to the second MAC address.
- the processor ( 505 of FIG. 5 ) either transmits an ARP request message or the first out-going packet via a communication unit (e.g. 501 of FIG. 5 ).
- the switch or router can discover the second MAC address by inspecting the updated MAC address to IP address mapping table and transfer downlink packets from the CN to the target AP governing the second MAC address.
- packets can be delivered to the MN via the target AP. It is to be understood that, if the MAC address to IP address mapping table is not updated after mutually authenticating the MN and the target AP, the switch or router still transfers packets from the CN to the serving AP, resulting in unexpected packet loss.
- FIG. 10 is an exemplary handoff procedure with IEEE 802.1x enabled and using EAP-MD5 when employing BDCS.
- the MN transmits/receives packets such as data, VoIP or other packets, to/from a CN in the described duty cycles, and discovers and authenticates a target AP in the described sleep cycles.
- the MN switches from a first channel associated with the serving AP to one of the other channels in one sleep cycle to discover whether an AP is present in that channel, and then switches from the other channel to the first channel to transmit/receive packets to/from the CN in one duty cycle.
- the MN After completing packet transmission/receiving, the MN switches from the first channel to another one of the other channels in the next sleep cycle to discover whether an AP is present in that channel.
- the sequences can be understood by those skilled in the art and further details are not presented here.
- the target AP As the MN only configures a single MAC address, after the MN sends an association or re-association request to the target AP, the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOVE-notify” packet to notify the serving AP that the configured MAC address of the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN.
- packets from the CN cannot be delivered to the MN via the serving AP, resulting in packet delay or loss. Also, packets from the CN cannot be delivered to the MN via the target AP until the MN and the target AP are mutually authenticated. Once the EAP authentication is completed, packets can be transmitted/received to/from the CN via the target AP.
- the handoff latency of uplink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS is T Reasso +T EAP MD5 .
- the handoff latency of downlink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS is also T Reasso +T EAP-MD5 .
- FIG. 11 is an exemplary handoff procedure with IEEE 802.1x enabled and using EAP-MD5 when employing BDCS and DMS.
- packets can be transmitted/received to/from a CN via the serving AP.
- an MAC address to IP address mapping table resident on a switch or a router is updated by receiving an ARP request message indicating that an IP address owned by the MN has mapped to a new MAC address.
- the details for updating the MAC address to IP address mapping table are similar to those described earlier.
- the handoff latency of uplink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS and DMS is zero.
- the handoff latency of downlink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS and DMS is TARP which is a period for updating the MAC address to IP address mapping table.
- FIG. 12 is an exemplary handoff procedure with IEEE 802.11i enabled and using EAP-TLS plus 4-way handshake when employing BDCS.
- the MN transmits/receives packets to/from a CN in the described duty cycles, and discovers and authenticates a target AP in the described sleep cycles.
- the details of channel scan employing BDCS may be understood by referring to the description of FIG. 10 .
- the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOV E-notify” packet to notify the serving AP that the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN.
- packets can be transmitted/received to/from the CN via the target AP.
- the handoff latency of uplink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS is T Reasso +T EAP-TLS +T 4-way .
- the handoff latency of downlink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS is also T Reasso +T EAP-TLS +T 4-way .
- FIG. 13 is an exemplary handoff procedure with IEEE 802.11i enabled and using EAP-TLS plus 4-way handshake when employing BDCS and DMS.
- a scan and authentication stage P 131 a re-association stage P 133 and an EAP authentication plus 4-way handshake stage P 135 , packets can be transmitted/received to/from a CN via the serving AP.
- the PTKs are installed in both the MN and the target AP, packets cannot be received from the CN via the target AP until an MAC address to IP address mapping table resident on a switch or a router is updated by receiving an ARP request message indicating that an IP address owned by the MN has mapped to a new MAC address.
- the details for updating the MAC address to IP address mapping table are similar to those described earlier.
- the handoff latency of uplink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS and DMS is zero.
- the handoff latency of downlink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS and DMS is T ARP .
- FIG. 14 is an exemplary handoff procedure with both IEEE 802.11f and IEEE 802.11i enabled when employing BDCS.
- the MN transmits/receives packets to/from a CN in the duty cycles, and discovers and authenticates a target AP in the sleep cycles.
- the details of channel scan employing BDCS may be understood by referring to the description of FIG. 10 .
- the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOVE-notify” packet to notify the serving AP that the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN.
- packets can be transmitted/received to/from the CN via the target AP.
- the handoff latency of uplink packets for the handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS is T 11f-Reasso +T 4-way .
- the handoff latency of downlink packets for the handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS is also T 11f-Reasso +T 4-way .
- FIG. 15 is an exemplary handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS and DMS.
- packets can be transmitted/received to/from a CN via the serving AP.
- packets cannot be received from the CN via the target AP until an MAC address to IP address mapping table resident on a switch or a router is updated by receiving an ARP request message indicating that an IP address owned by the MN has mapped to a new MAC address.
- the details for updating the MAC address to IP address mapping table are similar to those described earlier.
- the handoff latency of uplink packets for handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS and DMS is zero.
- the handoff latency of downlink packets for the handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS and DMS is TARP.
- Methods for smooth handoff in secured WLANs provided by a mobile node, or certain aspects or portions thereof, may take the form of program codes (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMS, hard drives, or any other machine-readable storage medium, wherein, when the program codes are loaded into and executed by a machine, such as a mobile phone, a computer, a DVD recorder or the like, the machine becomes an apparatus for practicing the invention.
- program codes i.e., instructions
- tangible media such as floppy diskettes, CD-ROMS, hard drives, or any other machine-readable storage medium
- the disclosed methods may also be embodied in the form of program codes transmitted over some transmission medium, such as electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program codes are received and loaded into and executed by a machine, such as a mobile phone, a computer or the like, the machine becomes an apparatus for practicing the invention.
- program codes When implemented on a general-purpose processor, the program codes combine with the processor to provide a unique apparatus that operate analogously to specific logic circuits.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
- The present application claims the benefit of U.S. provisional applications entitled “SYSTEM AND METHOD FOR SMOOTH HANDOFF MECHANISMS IN A WIRELESS RSN USING MULTIPLE MAC APPROACH”, Ser. No. 60/763,062, filed Jan. 27, 2006, and entitled “SYSTEM AND METHOD OF SMOOTH HAND-OFF MECHANISMS IN A WIRELESS RSN USING MULTIPLE MAC APPROACH”, Ser. No. 60/826,388, filed Sep. 21, 2006.
- The invention relates to wireless LAN (local area network), and more particularly, to systems and methods for smooth handoff in secured wireless LANs.
- In a wireless LAN, a mobile node (MN) associates with an access point (AP) and exchanges data and voice packets with a corresponding node (CN) via the associated AP. When the MN is moving out of range from one AP and can get a better radio link from another AP, a handoff procedure is performed to transfer an ongoing call or data session from the associated AP to the other AP (referred to as the target AP). The handoff procedure requires time to perform authentication, authorization and assignment of data encryption key for the target AP. As a result, some packets including data and voice packets may be lost during the handoff procedure, reducing the quality of data or voice transmission.
- Methods for handoff in a secured network, performed by a mobile node (MN), are provided. According to an embodiment of the present invention, a method for handoff in a secured network comprises the following steps. Channels are periodically switched between a first channel and one of multiple other channels during handoff to utilize the first channel to transmit/receive multiple packets to/from a corresponding node (CN) via a serving access point (AP) which the MN has associated with and utilize one of the other channels to perform a handoff procedure to a target AP which is to be associated with the MN. The first channel is switched to in multiple duty cycles of packet intervals and the other channels are switched to in multiple sleep cycles of packet intervals, where the duty cycles and the sleep cycles are interleaved.
- According to another embodiment of the present invention, a method for handoff in a secured network comprises the following steps. The MN is associated with a serving access point (AP) to transmit/receive multiple packets to/from a corresponding node (CN) using a first MAC (medium access control) address. The MN performs a handoff procedure to a target AP by employing a second MAC address. Once the handoff procedure is completed, the mobile node transmits/receives packets to/from the CN via the target AP.
- Systems for handoff in a secured network, resident on an MN, are provided. According to an embodiment of the present invention, a system for smooth handoff in a secured network comprises a communication unit and a processor coupled to the communication unit. The processor periodically directs the communication unit to switch channels between a first channel and one of a plurality of other channels during handoff to utilize the first channel to transmit/receive multiple packets to/from a CN via a serving AP which the MN has associated with and utilize one of the other channels to perform the handoff procedure to a target AP which is to be associated with the MN. The first channel is switched to in multiple duty cycles of packet intervals and the other channels are switched to in multiple sleep cycles of packet intervals, where the duty cycles and the sleep cycles are interleaved.
- According to another embodiment of the present invention, a system for smooth handoff in a secured network comprises a communication unit and a processor coupled to the communication unit. The processor associates with a serving AP to transmit/receive multiple packets to/from a CN via the communication unit using a first MAC address, and performs a handoff procedure to a target AP by employing a second MAC address. Once the handoff procedure is completed, the mobile node transmits/receives packets to/from the CN via the target AP.
- The present invention can be more fully understood by reading the subsequent detailed description and examples with references made to the accompanying drawings, wherein:
-
FIG. 1 a is a diagram of a mobile node being moved in an overlapping area between two cells respectively managed by two access points; -
FIG. 1 b is a diagram illustrating signal strength variation during the movement of the mobile node; -
FIG. 2 is a sequence diagram illustrating an exemplary IEEE 802.1x handoff procedure using EAP-MD5 (extensible authentication protocol-message digest 5); -
FIG. 3 is a sequence diagram illustrating an exemplary IEEE 802.11i handoff procedure using EAP-TLS (extensible authentication protocol-transport layer security) plus 4-way handshake; -
FIG. 4 is a sequence diagram illustrating an exemplary IEEE 802.11f plus IEEE 802.11i handoff procedure; -
FIG. 5 is a diagram of a hardware environment of an MN in which embodiments of the present invention may be implemented; -
FIG. 6 is a timing diagram for uplink and downlink of voice over IP (VoIP) packet exchanges according to an exemplary PS-Poll transmission scheme; -
FIG. 7 is a diagram illustrating an active scan according to an embodiment of the present invention; -
FIG. 8 is a diagram illustrating portions of a 4-way handshake according to an embodiment of the present invention; -
FIG. 9 is a sequence diagram illustrating an example of channel switching in the power saving mode (PSM) according to an embodiment of the present invention; -
FIG. 10 is an exemplary IEEE 802.1x handoff procedure using EAP-MD5 when employing bounded delay channel switching (BDCS) according to an embodiment of the present invention; -
FIG. 11 is an exemplary IEEE 802.1x handoff procedure using EAP-MD5 when employing BDCS and dual-MAC switching (DMS) according to an embodiment of the present invention; -
FIG. 12 is an exemplary IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS according to an embodiment of the present invention; -
FIG. 13 is an exemplary IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS and DMS according to an embodiment of the present invention; -
FIG. 14 is an exemplary IEEE 802.11f plus IEEE 802.11i handoff procedure when employing BDCS according to an embodiment of the present invention; and -
FIG. 15 is an exemplary IEEE 802.11f plus IEEE 802.11i handoff procedure when employing BDCS and DMS according to an embodiment of the present invention. -
FIG. 1 a is a diagram of a mobile node MN, such as a mobile phone, a notebook computer, a personal digital assistant (PDA) or the like, being moved in an overlapping area between cells C1 and C2 respectively managed by access points AP1 and AP2.FIG. 1 b is a diagram of signal strength variation during the movement of the mobile node MN shown inFIG. 1 a. During the movement when the mobile node MN is carried to a region closer to the access point AP2 than the access point AP1 (for example, carried from location P1 at time t1 to location P2 at time t2), a strength of a signal from AP1 decreases, and conversely, a strength of a signal from AP2 increases. The signal strength is typically measured in the form of signal-to-noise ratio (SNR) by the mobile node MN. A handoff procedure is activated to transfer an ongoing call or a communication session from AP1 to AP2 while, for example, the signal strength of the signal from AP1 is lower than a pre-defined threshold Th. AP1, also called a serving AP, is the AP that the MN is currently associated with. AP2, also called a target AP, is the AP which the MN will be associated with via a handoff. The handoff procedure typically comprises a channel scan to find an AP with the maximum signal strength (the target AP), an open system authentication, and an association with the target AP. -
FIG. 2 is a sequence diagram illustrating an exemplary handoff procedure based on IEEE 802.1x and EAP-MD5 (extensible authentication protocol-message digest 5). This is not prior art for purposes of determining the patentability of the invention and merely shows problems found by the present inventors. The entire sequence may be divided into four stages, including data transfer P21, scan and authentication P23, re-association P25 and EAP authentication P27. In the data transfer stage P21, when an MN detects that received signals from a serving AP are not strong enough, it activates a handoff procedure with IEEE 802.1x enabled. During the data transfer stage P21, packets, such as data, VoIP (voice over IP) or other packets, are transmitted/received to/from a corresponding node (CN). The next AP to be associated with is discovered and authenticated in the scan and authentication stage P23. Specifically, using an active scan approach, the MN sequentially switches to channels other than a channel utilized to communicate with the serving AP, sends probe requests via the other channels and receives probe responses via the other channels, and determines the next AP to be associated with (the target AP) according to signal strengths of the received probe responses. After determining the target AP, the MN sends messages to the target AP to initiate the authentication process. It is to be understood that, when the MN switches to other channels to perform the active scan, no data or voice packet can be transmitted/received to/from the CN via the currently associated AP, resulting in packet delay and loss. In the re-association stage P25, after the MN is successfully authenticated by the target AP, the MN establishes a link-layer connection to the target AP (the process is also called a re-association process). Although the MN establishes a link-layer connection with the target AP in the re-association stage P25, the MN still cannot receive/transmit packets from/to the CN via the target AP because the MN is not authenticated by using IEEE 802.1x yet. In the EAP authentication stage P27, the MN and an authentication server (referred to as the AS, which is an entity that provides authentication services for the authenticator) authenticate each other by EAPOW (extensible authentication protocol over wireless). After the AS authenticates the MN, the AS transmits a data packet comprising “RADIUS-Access Accept” message to the target AP to notify it that the MN is successfully authenticated. Subsequently, the target AP activates an authorized port, and transmits a data packet comprising “EAPOW success” message to the MN to notify it that the MN is successfully authenticated. At this point, the handoff is completed and packets can be transmitted/received to/from the CN via the target AP. The period from the MN disconnecting from the serving AP to the MN connecting to the target AP again is called handoff latency which introduces packet losses during the handoff procedure. The handoff latency for the handoff based on IEEE 802.1x using EAP-MD5 is the sum of the time required for the scan, authentication, re-association and EAP authentication processes, i.e., Tscan+Tauth+Tasso+TEAP. -
FIG. 3 is a sequence diagram illustrating an exemplary handoff procedure with IEEE 802.1x and IEEE 802.11i enabled and using EAP-TLS (extensible authentication protocol-transport layer security) plus 4-way handshake. This is not prior art for purposes of determining the patentability of the invention and merely shows problems found by the present inventors. The entire sequence may be divided into four stages, including data transfer P31, scan and authentication P33, re-association P35, and EAP authentication plus 4-way handshake P37. The data transfer stage P31, the scan and authentication stage P33, and the re-association stage P35 may be understood by referring to the descriptions of data transfer stage P21, the scan and authentication stage P23, and the re-association stage P25 ofFIG. 2 . In the EAP authentication with 4-way handshake stage P37, the MN and the AS authenticate each other using EAP-TLS and the AS generates a pairwise master key (PMK). The AS subsequently transmits the generated PMK to the MN and the target AP in a secure way. Thereafter, the MN performs a 4-way handshake with the target AP to generate a pairwise transient key (PTK) from the PMK. The PTK changes periodically and is employed to encrypt and decrypt WLAN link-layer frames. Specifically, the PTK is asset of keying materials containing the cryptographic keys for secure handshake and data transmissions, including the temporal key (TK), EAPOL-key confirmation key (KCK), and EAPoL-key encryption key (KEK). Handshaking messages are encapsulated in the IEEE 802.1x EAPoL-Key format, and are protected against man-in-the-middle attacks. In the 4-way handshake, the target AP start by sending a random nonce, called “ANonce”, to the MN. After receiving the message, the MN generates another random nonce, called “SNonce”. These two random nonce and shared PMK are then used to produce the PTK. After that, the MN replies by sendingmessage 2 with the SNonce to the target AP, which is protected by MIC (message integrity code). The target AP generates the PTK in the same way as the MN and verifies the MIC. The target AP sends message 3 to notify the MN of the installation of the PTK after successfully verifying the MIC. Finally, the MN replies to the target AP with message 4 to confirm the installation of the PTK. As a result, new keying materials are synchronized and used by both the MN and the target AP. Once the PTK is successfully installed in the EAP authentication plus 4-way handshake stage P37, the handoff is completed and packets can be transmitted/received to/from the CN via the target AP. The handoff latency for the IEEE 802.1x handoff using EAP-TLS plus 4-way handshake is the sum of the time required for the scan, authentication, re-association, EAP authentication and 4-way handshake processes, i.e., TScan+Tauth+Tasso+TEAP-TLS+T4way. -
FIG. 4 is a sequence diagram illustrating an exemplary handoff procedure with IEEE 802.11f and IEEE 802.11i enabled. This is not prior art for purposes of determining the patentability of the invention and merely shows problems found by the present inventors. The entire sequence may be divided into four stages, including data transfer P41, scan and authentication P43, re-association P45, and 4-way handshake P47. The data transfer stage P41 and the scan and authentication stage P43 may be understood by referring to the descriptions of data transfer stage P21 and the scan and authentication stage P23 ofFIG. 2 . In the re-association stage P45, after receiving a re-association request, the target AP transmits a data packet comprising a “Move-Notify” message to the serving AP to notify it that the MN prepares to disconnect from the serving AP. Subsequently, the serving AP transmits a data packet comprising a “Move-Response” message to the target AP. The “Move-Response” message further provides a previously acquired PMK, enabling the target AP to continue the subsequent 4-way handshake without further EAP authentication. After the re-association stage P45, the MN and the target AP proceed to the 4-way handshake described earlier with reference toFIG. 3 . The handoff latency for the IEEE 802.11f plus IEEE 802.11i handoff is Tscan+Tauth+Tasso+T4way. -
FIG. 5 is a schematic diagram of the hardware structure of a mobile node in which handoff methods according to embodiments of the present invention may be implemented. TheMN 500 comprises acommunication unit 501, amicrophone 502, aspeaker 503, anantenna 504, aprocessor 505,memory 506,storage media 513, adisplay device 514, akeypad controller 530 and akeypad 531. Thecommunication unit 501 communicates with APs via theantenna 504 when connecting to a wireless network, such as a wireless LAN (local area network) or the like. Theprocessor 505 is connected to thecommunication unit 501,memory 506,storage media 513,display device 514, andkeypad controller 530 via various bus architectures. - The conventional MN only configures a single MAC (medium access control) address, and an MAC address can only been associated with one AP in a subnet. After the conventional MN associates or re-associates with a target AP, the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOVE-notify” packet to notify the serving AP that the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN. Association with the target AP indicates that the target AP had never been associated with the MN. Re-association with the target AP indicates that the target AP had been associated with the MN before.
- In embodiments of the present invention, the
MN 500 may configure two MAC addresses in a single WLAN interface, and such configuration may be implemented in the MAC firmware, called dual-MAC switching (DMS). TheMN 500 uses different MAC addresses to separately communicate with the serving and target APs. Therefore, when these two APs are located in the same subnet, theMN 500 still can switch between serving and target APs with two different MACs and maintain both link-layer and network connections with the two APs simultaneously during a handoff procedure. - Packets such as data, VoIP or other packets are transmitted periodically, with for example 10 ms or 30 ms packet intervals. One packet interval may be used for one packet transmission, and an MN typically spends a short period, called a duty cycle, to transmit or receive one packet, and stays idle before initiation of the next packet communication. Therefore, an MN can experience a period of free time, called a sleep cycle, between two packet exchanges. That is, each packet interval is composed of one duty cycle and one sleep cycle.
-
FIG. 6 is a timing diagram for uplink and downlink of VoIP packet exchanges according to an exemplary PS-Poll transmission scheme described in Chen et. al., “Power Management for VoIP over IEEE 802.11 WLAN,” IEEE Wireless Communication and Networking (WCNC), March 2004. The PS-Poll transmission scheme adopts the power saving mode (PSM) defined in the IEEE 802.11 standard to transmit and receive packets in WLANs. An MN first notifies the serving AP that it is entering the PSM, and then stays in the WLAN doze state. If the MN has an uplink packet to transmit, it wakes up and sends the packet. After receiving an acknowledgement frame for the uplink packet form the serving AP, comprising information indicating that some data is buffered by the serving AP, the MN sends a PS-Poll frame to retrieve the downlink packet buffered on the serving AP. Finally, the MN receives and acknowledges the downlink packet. - Another transmission scheme is automatic power saving delivery (APSD) defined in the IEEE 802.lle. Still another transmission scheme is described below. Before receiving a buffered downlink packet from the CN, the MN transmits a re-association request comprising a PSM (power saving mode) flag being “false” to the serving AP to notify the serving AP that the MN is awake and ready to receive buffered downlink packets. When the MN enters the PSM, the MN transmits a re-association request comprising a PSM flag being “true”.
- In any of these three transmission schemes, sleep cycles can be provided between two packet exchange periods. For example, referring to
FIG. 7 , the uplink and downlink packets are transmitted and received periodically, and the period (the packet interval) is denoted Ti. The MN spends the length of a duty cycle, denoted Tdc, to transmit uplink and receive downlink packets in each period via a channel associated with a serving AP. The MN uses the sleep cycles, denoted Ti-Tdc, to switch to one of the other channels and to perform scan, association, re-association, authentication, 4-way handshake or other operations with an AP other than the serving AP, before switching back to the channel associated with the serving AP. This operation is called bounded delay channel switching (BDCS). Specifically, the processor of the MN (e.g. 505 ofFIG. 5 ) spends the length of a duty cycle to transmit uplink and receive downlink packets in each period via the communication unit (e.g. 501 ofFIG. 5 ). The processor uses the sleep cycles to switch to one of the other channels and to perform scan, association, re-association, authentication, 4-way handshake or other operations with an AP other than the serving AP via the communication unit, before switching back to the channel associated with the serving AP. - Contrary to the earlier-described active scan in the scan and authentication stages P23 of
FIG. 2 , P33 ofFIG. 3 , and P43 ofFIG. 4 , in the BDCS method, an MN scans each channel in sleep cycles. Specifically, the processor (e.g. 505 ofFIG. 5 ) scans each channel in sleep cycles via a communication unit (e.g. 501 ofFIG. 5 ). -
FIG. 7 is a diagram illustrating an example of an active scan using BDCS. After the MN (e.g. 500 ofFIG. 5 ) completes its uplink and downlink transmission with the serving AP via a first channel, the MN switches to and scans another channel, such as the sixth channel, by sending a probe request and waiting for probe responses from APs in the other channel. After a waiting period, the MN switches back to the first channel to transmit and receive packets with the serving AP again. The period that the MN can stay in another channel is Ti-Tdc-2xTs, where Ts denotes the channel switching time. Two parameters may be configured, including a maximum probe time Tmax and a minimum probe time Tmin. The minimum probe time is the minimum waiting time for a probe request without getting any probe response. When the MN receives at least one probe response from active APs within the minimum probe time, the MN waits for the maximum probe time to collect all APs' responses in the same channel. Typically, the length of a sleep cycle is long enough to scan at least one channel, i.e. sending a probe request and receiving at least one probe response when at least one active AP is present in the scanned channel. After scanning relevant channels using sleep cycles, the MN determines the next AP to be associated with (i.e. the target AP) according to the received probe responses. The target AP may be the AP that sent a probe response with the strongest signal strength. Then, the MN performs open authentication with the target AP during sleep cycles. Specially, the processor of the MN (e.g. 505 ofFIG. 5 ) performs open authentication with the target AP via the communication unit (e.g. 501 ofFIG. 5 ) during sleep cycles. The MN may send an authentication request to the target AP, receive an authentication response comprising validation information from the target AP and determine whether the target AP is authenticated by inspecting the validation information. - Contrary to the earlier-described re-association stages P25 of
FIG. 2 , P35 ofFIG. 3 , and P45 ofFIG. 4 , in the BDCS method, an MN sends an association or re-association request informing the target AP that association or re-association with the target AP is initiated, and receives an association or re-association response from the target AP in sleep cycles. Specifically, the processor (e.g. 505 ofFIG. 5 ) sends an association or re-association request informing the target AP that association or re-association with the target AP is initiated, and receives an association or re-association response from the target AP in sleep cycles via the communication unit (e.g. 501 ofFIG. 5 ). - Furthermore, an MN (e.g. 500 of
FIG. 5 ) may use another MAC address, different from the MAC address which has been used to associate the MN with the serving AP, to associate or re-associate with the target AP. In other words, the MN sends an association or re-association request comprising a different MAC address, and as a result, the serving AP will not be forced to de-associate from the MN. Using two different MAC addresses to communicate with the serving and target APs maintains both connections with the two APs simultaneously. - Due to the fluctuation of network traffics and channel condition, after the re-association, the MN may inform the target AP that the MN is entering the power saving mode (PSM). Then, the target AP starts to buffer messages and packets to the MN. Thus, the MN can send request messages in one sleep cycle and retrieve response messages by sending a polling message to the target AP in the subsequent sleep cycles during the described EAP authentication stage (e.g. P27 of
FIG. 2 ), EAP authentication plus 4-way handshake stage (e.g. P37 ofFIG. 3 ) or 4-way handshake stage (e.g. P47 ofFIG. 4 ). - For example, the target AP is informed that the MN has entered PSM after association or re-association with the target AP, and the target AP buffers an EAPOW request message, an EAPOW success message, an EAPOW message with “ANonce”, and/or an EAPOW message notification of installation of the PTK during the EAP authentication and/or 4-way handshake. The buffered message is sent to the MN when the target AP receives a polling message from the MN.
-
FIG. 8 is a diagram illustrating portions of an exemplary 4-way handshake in which an MN (e.g. 500 ofFIG. 5 ) actively retrieves messages from a target AP and performs a 4-way handshake with the target AP using another MAC address. The full IEEE 802.1x authentication and IEEE 802.11i 4-way handshake in sleep cycles using another MAC address may be understood from this example. - The MN may also inform a serving AP that the MN is entering the PSM to prevent loss of incoming packets. Then, the serving AP starts to buffer packets to the MN.
FIG. 9 is a sequence diagram illustrating an exemplary channel switching in PSM. Before retrieving the buffered VoIP packets, the MN transmits a data packet comprising a “PS-Poll” message (i.e. a polling message) indicating that the MN is ready to receive the buffered packets. - Contrary to the earlier-described EAP authentication stage P27 of
FIG. 2 , EAP authentication plus 4-way handshake stage P37 ofFIG. 3 or 4-way handshake stage P47 ofFIG. 4 , in the BDCS method, an MN sends an EAPOW start message, an EAPOW response message, an EAPOW message with “SNonce”, an EAPOW message notification of installation of the PTK, or combinations of the above, and receives an EAPOW request message, an EAPOW success message, an EAPOW message with “ANonce”, an EAPOW message notification of installation of the PTK from the target AP, or combinations of the above, in sleep cycles. Specifically, the processor (e.g. 505 ofFIG. 5 ) sends an EAPOW start message, an EAPOW response message, an EAPOW message with “SNonce”, an EAPOW message notification of installation of the PTK or combinations of the above, and receives an EAPOW request message, an EAPOW success message, an EAPOW message with “ANonce”, an EAPOW message notification of installation of the PTK from the target AP, or combinations of the above, in sleep cycles via the communication unit (e.g. 501 ofFIG. 5 ). - By employing dual-MAC switching (DMS) embodiment of the present invention, the original connection is maintained after associating or re-associating with the target AP. Furthermore, using the bounded delay channel switching (BDCS) embodiment of the present invention, the MN can receive downlink packets from the CN and transmit uplink packets via the original channel using a first MAC address in duty cycles, and mutually authenticate the MN and the target AP using a second MAC address in sleep cycles. It is to be understood that a switch or a router (which is responsible for transferring packets from the CN to the serving AP or the target AP) stores an MAC address to IP address mapping table originally comprising information indicating that an IP address owned by the MN has mapped to the first MAC address, enabling the switch or router to discover the first MAC address and transfer downlink packets to the MN via the serving AP governing the first MAC address. After the described EAP authentication stage (e.g. P27 of
FIG. 2 ), EAP authentication plus 4-way handshake stage (e.g. P37 ofFIG. 3 ), or 4-way handshake stage (e.g. P47 ofFIG. 4 ), the MN either transmits an ARP (address resolution protocol) request message or the first out-going packet to update the MAC address to IP address mapping table indicating that an IP address owned by the MN has mapped to the second MAC address. Specifically, the processor (505 ofFIG. 5 ) either transmits an ARP request message or the first out-going packet via a communication unit (e.g. 501 ofFIG. 5 ). After that, the switch or router can discover the second MAC address by inspecting the updated MAC address to IP address mapping table and transfer downlink packets from the CN to the target AP governing the second MAC address. Thus, after the ARP update, packets can be delivered to the MN via the target AP. It is to be understood that, if the MAC address to IP address mapping table is not updated after mutually authenticating the MN and the target AP, the switch or router still transfers packets from the CN to the serving AP, resulting in unexpected packet loss. -
FIG. 10 is an exemplary handoff procedure with IEEE 802.1x enabled and using EAP-MD5 when employing BDCS. During a scan and authentication stage P100, the MN transmits/receives packets such as data, VoIP or other packets, to/from a CN in the described duty cycles, and discovers and authenticates a target AP in the described sleep cycles. Specifically, in channel scan, the MN switches from a first channel associated with the serving AP to one of the other channels in one sleep cycle to discover whether an AP is present in that channel, and then switches from the other channel to the first channel to transmit/receive packets to/from the CN in one duty cycle. After completing packet transmission/receiving, the MN switches from the first channel to another one of the other channels in the next sleep cycle to discover whether an AP is present in that channel. The sequences can be understood by those skilled in the art and further details are not presented here. As the MN only configures a single MAC address, after the MN sends an association or re-association request to the target AP, the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOVE-notify” packet to notify the serving AP that the configured MAC address of the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN. Therefore, packets from the CN cannot be delivered to the MN via the serving AP, resulting in packet delay or loss. Also, packets from the CN cannot be delivered to the MN via the target AP until the MN and the target AP are mutually authenticated. Once the EAP authentication is completed, packets can be transmitted/received to/from the CN via the target AP. The handoff latency of uplink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS is TReasso+TEAP MD5. The handoff latency of downlink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS is also TReasso+TEAP-MD5. -
FIG. 11 is an exemplary handoff procedure with IEEE 802.1x enabled and using EAP-MD5 when employing BDCS and DMS. During a scan and authentication stage P111, a re-association stage P113 and an EAP authentication stage P115, packets can be transmitted/received to/from a CN via the serving AP. Once the EAP authentication is completed, packets cannot be received from the CN via the target AP until an MAC address to IP address mapping table resident on a switch or a router is updated by receiving an ARP request message indicating that an IP address owned by the MN has mapped to a new MAC address. The details for updating the MAC address to IP address mapping table are similar to those described earlier. The handoff latency of uplink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS and DMS is zero. The handoff latency of downlink packets for the IEEE 802.1x handoff using EAP-MD5 when employing BDCS and DMS is TARP which is a period for updating the MAC address to IP address mapping table. -
FIG. 12 is an exemplary handoff procedure with IEEE 802.11i enabled and using EAP-TLS plus 4-way handshake when employing BDCS. During a scan and authentication stage P120, the MN transmits/receives packets to/from a CN in the described duty cycles, and discovers and authenticates a target AP in the described sleep cycles. The details of channel scan employing BDCS may be understood by referring to the description ofFIG. 10 . As the MN only configures a single MAC address, after the MN associates or re-associates with the target AP, the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOV E-notify” packet to notify the serving AP that the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN. After the PTKs are installed in both the MN and the target AP, packets can be transmitted/received to/from the CN via the target AP. The handoff latency of uplink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS is TReasso+TEAP-TLS+T4-way. The handoff latency of downlink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS is also TReasso+TEAP-TLS+T4-way. -
FIG. 13 is an exemplary handoff procedure with IEEE 802.11i enabled and using EAP-TLS plus 4-way handshake when employing BDCS and DMS. During a scan and authentication stage P131, a re-association stage P133 and an EAP authentication plus 4-way handshake stage P135, packets can be transmitted/received to/from a CN via the serving AP. After the PTKs are installed in both the MN and the target AP, packets cannot be received from the CN via the target AP until an MAC address to IP address mapping table resident on a switch or a router is updated by receiving an ARP request message indicating that an IP address owned by the MN has mapped to a new MAC address. The details for updating the MAC address to IP address mapping table are similar to those described earlier. The handoff latency of uplink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS and DMS is zero. The handoff latency of downlink packets for the IEEE 802.11i handoff procedure using EAP-TLS plus 4-way handshake when employing BDCS and DMS is TARP. -
FIG. 14 is an exemplary handoff procedure with both IEEE 802.11f and IEEE 802.11i enabled when employing BDCS. During a scan and authentication stage P140, the MN transmits/receives packets to/from a CN in the duty cycles, and discovers and authenticates a target AP in the sleep cycles. The details of channel scan employing BDCS may be understood by referring to the description ofFIG. 10 . As the MN only configures a single MAC address, after the MN associates or re-associates with the target AP, the target AP uni-casts or broadcasts a “IAPP ADD-notify” or “IAPP MOVE-notify” packet to notify the serving AP that the MN has re-associated or associated with the target AP, forcing the serving AP to automatically de-associate from the MN. After the PTKs are installed in both the MN and the target AP, packets can be transmitted/received to/from the CN via the target AP. The handoff latency of uplink packets for the handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS is T11f-Reasso+T4-way. The handoff latency of downlink packets for the handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS is also T11f-Reasso+T4-way. -
FIG. 15 is an exemplary handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS and DMS. During a scan and authentication stage P151, a re-association stage P153 and a 4-way handshake stage P155, packets can be transmitted/received to/from a CN via the serving AP. After the PTKs are installed in both the MN and the target AP, packets cannot be received from the CN via the target AP until an MAC address to IP address mapping table resident on a switch or a router is updated by receiving an ARP request message indicating that an IP address owned by the MN has mapped to a new MAC address. The details for updating the MAC address to IP address mapping table are similar to those described earlier. The handoff latency of uplink packets for handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS and DMS is zero. The handoff latency of downlink packets for the handoff procedure with IEEE 802.11f and IEEE 802.11i enabled when employing BDCS and DMS is TARP. - Methods for smooth handoff in secured WLANs provided by a mobile node, or certain aspects or portions thereof, may take the form of program codes (i.e., instructions) embodied in tangible media, such as floppy diskettes, CD-ROMS, hard drives, or any other machine-readable storage medium, wherein, when the program codes are loaded into and executed by a machine, such as a mobile phone, a computer, a DVD recorder or the like, the machine becomes an apparatus for practicing the invention. The disclosed methods may also be embodied in the form of program codes transmitted over some transmission medium, such as electrical wiring or cabling, through fiber optics, or via any other form of transmission, wherein, when the program codes are received and loaded into and executed by a machine, such as a mobile phone, a computer or the like, the machine becomes an apparatus for practicing the invention. When implemented on a general-purpose processor, the program codes combine with the processor to provide a unique apparatus that operate analogously to specific logic circuits.
- Certain terms are used throughout the description and claims to refer to particular system components. As one skilled in the art will appreciate, consumer electronic equipment manufacturers may refer to a component by different names. This document does not intend to distinguish between components that differ in name but not function.
- Although the invention has been described in terms of preferred embodiment, it is not limited thereto. Those skilled in the art can make various alterations and modifications without departing from the scope and spirit of the invention. Therefore, the scope of the invention shall be defined and protected by the following claims and their equivalents.
Claims (46)
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/616,448 US7864732B2 (en) | 2006-01-27 | 2006-12-27 | Systems and methods for handoff in wireless network |
DE102007002077A DE102007002077B4 (en) | 2006-01-27 | 2007-01-09 | System and method for handoff in wireless networks |
TW096102810A TWI339992B (en) | 2006-01-27 | 2007-01-25 | Systems and methods for handoff in wireless network |
JP2007016433A JP4635014B2 (en) | 2006-01-27 | 2007-01-26 | Wireless network handoff system and method |
CN201110335063.9A CN102395170B (en) | 2006-01-27 | 2007-01-29 | Handover system and method in wireless network |
CN2007100082868A CN101014041B (en) | 2006-01-27 | 2007-01-29 | Handover system and method in wireless network |
US12/957,630 US8442008B2 (en) | 2006-01-27 | 2010-12-01 | Systems and methods for handoff in wireless network |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US76306206P | 2006-01-27 | 2006-01-27 | |
US82638806P | 2006-09-21 | 2006-09-21 | |
US11/616,448 US7864732B2 (en) | 2006-01-27 | 2006-12-27 | Systems and methods for handoff in wireless network |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/957,630 Continuation US8442008B2 (en) | 2006-01-27 | 2010-12-01 | Systems and methods for handoff in wireless network |
Publications (2)
Publication Number | Publication Date |
---|---|
US20070177549A1 true US20070177549A1 (en) | 2007-08-02 |
US7864732B2 US7864732B2 (en) | 2011-01-04 |
Family
ID=38266133
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/616,448 Active 2029-02-21 US7864732B2 (en) | 2006-01-27 | 2006-12-27 | Systems and methods for handoff in wireless network |
US12/957,630 Active 2027-12-19 US8442008B2 (en) | 2006-01-27 | 2010-12-01 | Systems and methods for handoff in wireless network |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/957,630 Active 2027-12-19 US8442008B2 (en) | 2006-01-27 | 2010-12-01 | Systems and methods for handoff in wireless network |
Country Status (5)
Country | Link |
---|---|
US (2) | US7864732B2 (en) |
JP (1) | JP4635014B2 (en) |
CN (2) | CN101014041B (en) |
DE (1) | DE102007002077B4 (en) |
TW (1) | TWI339992B (en) |
Cited By (39)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070257777A1 (en) * | 2006-05-03 | 2007-11-08 | Samsung Electronics Co., Ltd. | Method and apparatus for detecting device change in wireless network environment |
US20090003340A1 (en) * | 2007-06-28 | 2009-01-01 | Rebelvox, Llc | Telecommunication and multimedia management method and apparatus |
US20100067487A1 (en) * | 2006-11-29 | 2010-03-18 | Kyocera Corporation | Wireless Communication Terminal, Hand-Off Method in Wireless Communication Terminal, and Wireless Communication System |
EP2262326A1 (en) * | 2009-06-12 | 2010-12-15 | Samsung Electronics Co., Ltd. | Method and apparatus for connecting portable terminal to WLAN |
US20120076072A1 (en) * | 2010-09-24 | 2012-03-29 | Marc Jalfon | System and method for maintaining privacy in a wireless network |
US20130044733A1 (en) * | 2010-11-25 | 2013-02-21 | Sk Telecom Co., Ltd. | Authentication system and authentication method in wireless lan environment |
US20130070601A1 (en) * | 2011-09-15 | 2013-03-21 | Wistron Neweb Corp. | Method for increasing wireless networking speed, and a wireless network apparatus |
US20130235824A1 (en) * | 2007-03-21 | 2013-09-12 | Samsung Electronics Co., Ltd. | Apparatus and method for obtaining ip address of terminal using multiple frequency allocations in broadband wireless communication system |
US20130265958A1 (en) * | 2012-04-06 | 2013-10-10 | Suitable Technolgies, Inc. | System for wireless connectivity continuity and quality |
US20130265885A1 (en) * | 2012-04-06 | 2013-10-10 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US20130279479A1 (en) * | 2012-04-06 | 2013-10-24 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US20130279473A1 (en) * | 2012-04-06 | 2013-10-24 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US20130343344A1 (en) * | 2012-04-06 | 2013-12-26 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US8630255B1 (en) * | 2006-09-19 | 2014-01-14 | Marvell International Ltd. | Wireless adapter with auxiliary radio channel for advanced channel scanning |
US20140036725A1 (en) * | 2009-04-08 | 2014-02-06 | Sony Corporation | Wireless communication device, wireless communication system, wireless communication method and program |
EP2334114A4 (en) * | 2008-09-22 | 2014-07-23 | Sharp Kk | Wireless communication system, base station device, mobile station device, and wireless communication method |
US20150043562A1 (en) * | 2012-04-25 | 2015-02-12 | Huawei Device Co., Ltd. | Wireless network discovery method and apparatus |
EP2782395A4 (en) * | 2011-11-14 | 2015-06-24 | Zte Corp | METHOD AND SYSTEM FOR ROUTE OPTIMIZATION DURING TRANSFER AND ACCESS NETWORK ELEMENT |
WO2015123698A1 (en) * | 2014-02-17 | 2015-08-20 | Jalali Ahmad Jalali | Mobility and power management for high altitude platform (hap) communication systems |
US9307568B2 (en) | 2012-04-06 | 2016-04-05 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US9320074B2 (en) | 2012-04-06 | 2016-04-19 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US9320076B2 (en) | 2012-04-06 | 2016-04-19 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US20160183189A1 (en) * | 2014-12-22 | 2016-06-23 | Qualcomm Incorporated | Methods and apparatus for enhanced power save protocol |
US9634969B2 (en) | 2007-06-28 | 2017-04-25 | Voxer Ip Llc | Real-time messaging method and apparatus |
US9807569B2 (en) | 2014-02-17 | 2017-10-31 | Ubiqomm, Inc | Location based services provided via unmanned aerial vehicles (UAVs) |
US10244446B2 (en) * | 2016-04-22 | 2019-03-26 | Huawei Technologies Co., Ltd. | Triggering terminal roaming by access point |
US20190158413A1 (en) * | 2017-11-17 | 2019-05-23 | Qualcomm Incorporated | Link aggregation with floating primary link |
US10375139B2 (en) | 2007-06-28 | 2019-08-06 | Voxer Ip Llc | Method for downloading and using a communication application through a web browser |
US20190289539A1 (en) * | 2011-12-22 | 2019-09-19 | Electronics And Telecommunications Research Institute | Method and apparatus of scanning in wireless local area network system |
US10687272B2 (en) | 2012-04-06 | 2020-06-16 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US10820259B2 (en) | 2012-04-06 | 2020-10-27 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US10911349B2 (en) | 2017-11-17 | 2021-02-02 | Qualcomm Incorporated | Link aggregation with floating primary link |
US10952261B2 (en) | 2012-04-06 | 2021-03-16 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US10952262B2 (en) | 2012-04-06 | 2021-03-16 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US11019558B2 (en) * | 2016-10-25 | 2021-05-25 | Huawei Technologies Co., Ltd. | Wireless local area network association method and device, and central access point |
US11095583B2 (en) | 2007-06-28 | 2021-08-17 | Voxer Ip Llc | Real-time messaging method and apparatus |
US11582606B2 (en) * | 2018-08-07 | 2023-02-14 | Xi'an Yep Telecommunication Technology, Ltd. | Terminal verification method, and AP device, terminal and system |
US20230140991A1 (en) * | 2021-11-10 | 2023-05-11 | Qualcomm Incorporated | Local area network (lan) device privacy |
US11659041B2 (en) | 2012-09-24 | 2023-05-23 | Blue Ocean Robotics Aps | Systems and methods for remote presence |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7864732B2 (en) * | 2006-01-27 | 2011-01-04 | Mediatek Inc. | Systems and methods for handoff in wireless network |
US8000708B1 (en) * | 2007-09-11 | 2011-08-16 | Sprint Communications Company L.P. | Seamless inter-network handoff |
RU2535785C2 (en) | 2009-02-13 | 2014-12-20 | Телефонактиеболагет Лм Эрикссон (Пабл) | Control of wireless communication node power consumption |
WO2016015749A1 (en) * | 2014-07-28 | 2016-02-04 | Telefonaktiebolaget L M Ericsson (Publ) | Authentication in a wireless communications network |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5896368A (en) * | 1995-05-01 | 1999-04-20 | Telefonaktiebolaget Lm Ericsson | Multi-code compressed mode DS-CDMA systems and methods |
US20030185233A1 (en) * | 2002-03-29 | 2003-10-02 | Fujitsu Limited | Method, apparatus, and medium for migration across link technologies |
US20030224775A1 (en) * | 2001-11-21 | 2003-12-04 | Nec Corporation | Radio access communication system capable of preventing packet loss |
US20040218580A1 (en) * | 2003-05-02 | 2004-11-04 | Microsoft Corporation | Method to enable simultaneous connections to multiple wireless networks using a single radio |
US20040240412A1 (en) * | 2003-05-27 | 2004-12-02 | Winget Nancy Cam | Facilitating 802.11 roaming by pre-establishing session keys |
US20040242228A1 (en) * | 2003-01-14 | 2004-12-02 | Samsung Electronics Co., Ltd. | Method for fast roaming in a wireless network |
US20050163078A1 (en) * | 2004-01-22 | 2005-07-28 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20050237962A1 (en) * | 2004-04-26 | 2005-10-27 | Motorola, Inc. | Mobile station mobility in a wireless LAN |
US20060062183A1 (en) * | 2004-03-03 | 2006-03-23 | Forte Andrea G | Methods and systems for reducing MAC layer handoff latency in wireless networks |
US20060079232A1 (en) * | 2004-09-22 | 2006-04-13 | Nec Corporation | Wireless LAN handover method, wireless terminal, program product for use in the wireless terminal, and wireless communications system |
US20060182104A1 (en) * | 2005-02-14 | 2006-08-17 | Samsung Electronics Co., Ltd. | Method and apparatus for registering mobile node in a wireless local area network (LAN) environment |
US20070047490A1 (en) * | 2005-08-29 | 2007-03-01 | Nokia Corporation | Fast handoff in wireless local area network |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2004304280A (en) | 2003-03-28 | 2004-10-28 | Mitsubishi Electric Corp | Network configuration method, backbone router, and relaying apparatus |
WO2004107671A1 (en) | 2003-05-27 | 2004-12-09 | Fujitsu Limited | Communication device |
US20040264394A1 (en) * | 2003-06-30 | 2004-12-30 | Boris Ginzburg | Method and apparatus for multi-channel wireless LAN architecture |
JP4427653B2 (en) | 2004-02-27 | 2010-03-10 | 独立行政法人情報通信研究機構 | Frame relay method in layer 2 switch network |
JP2005295186A (en) | 2004-03-31 | 2005-10-20 | Toshiba Corp | Radio lan terminal, radio communication system and communication control method |
JP4421936B2 (en) | 2004-05-07 | 2010-02-24 | 三菱電機株式会社 | Handover method, communication system, and terminal station |
JP2006005630A (en) | 2004-06-17 | 2006-01-05 | Toyota Industries Corp | Wireless terminal, network connecting device, and method and program for searching for candidate to be switched |
US20060268799A1 (en) * | 2005-05-27 | 2006-11-30 | Utstarcom, Inc. | METHOD AND APPARATUS FOR WiFi TERMINAL WITH DUAL MAC STRUCTURE THAT ENABLES SEAMLESS VOICE COMMUNICATIONS HANDOVER |
US7864732B2 (en) * | 2006-01-27 | 2011-01-04 | Mediatek Inc. | Systems and methods for handoff in wireless network |
-
2006
- 2006-12-27 US US11/616,448 patent/US7864732B2/en active Active
-
2007
- 2007-01-09 DE DE102007002077A patent/DE102007002077B4/en active Active
- 2007-01-25 TW TW096102810A patent/TWI339992B/en not_active IP Right Cessation
- 2007-01-26 JP JP2007016433A patent/JP4635014B2/en active Active
- 2007-01-29 CN CN2007100082868A patent/CN101014041B/en active Active
- 2007-01-29 CN CN201110335063.9A patent/CN102395170B/en active Active
-
2010
- 2010-12-01 US US12/957,630 patent/US8442008B2/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5896368A (en) * | 1995-05-01 | 1999-04-20 | Telefonaktiebolaget Lm Ericsson | Multi-code compressed mode DS-CDMA systems and methods |
US20030224775A1 (en) * | 2001-11-21 | 2003-12-04 | Nec Corporation | Radio access communication system capable of preventing packet loss |
US20030185233A1 (en) * | 2002-03-29 | 2003-10-02 | Fujitsu Limited | Method, apparatus, and medium for migration across link technologies |
US20040242228A1 (en) * | 2003-01-14 | 2004-12-02 | Samsung Electronics Co., Ltd. | Method for fast roaming in a wireless network |
US20040218580A1 (en) * | 2003-05-02 | 2004-11-04 | Microsoft Corporation | Method to enable simultaneous connections to multiple wireless networks using a single radio |
US20040240412A1 (en) * | 2003-05-27 | 2004-12-02 | Winget Nancy Cam | Facilitating 802.11 roaming by pre-establishing session keys |
US20050163078A1 (en) * | 2004-01-22 | 2005-07-28 | Toshiba America Research, Inc. | Mobility architecture using pre-authentication, pre-configuration and/or virtual soft-handoff |
US20060062183A1 (en) * | 2004-03-03 | 2006-03-23 | Forte Andrea G | Methods and systems for reducing MAC layer handoff latency in wireless networks |
US20050237962A1 (en) * | 2004-04-26 | 2005-10-27 | Motorola, Inc. | Mobile station mobility in a wireless LAN |
US20060079232A1 (en) * | 2004-09-22 | 2006-04-13 | Nec Corporation | Wireless LAN handover method, wireless terminal, program product for use in the wireless terminal, and wireless communications system |
US20060182104A1 (en) * | 2005-02-14 | 2006-08-17 | Samsung Electronics Co., Ltd. | Method and apparatus for registering mobile node in a wireless local area network (LAN) environment |
US20070047490A1 (en) * | 2005-08-29 | 2007-03-01 | Nokia Corporation | Fast handoff in wireless local area network |
Cited By (112)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070257777A1 (en) * | 2006-05-03 | 2007-11-08 | Samsung Electronics Co., Ltd. | Method and apparatus for detecting device change in wireless network environment |
US9357457B1 (en) | 2006-09-19 | 2016-05-31 | Marvell International Ltd. | Method and apparatus for scanning of channels simultaneously with exchanging data in a wireless device |
US8630255B1 (en) * | 2006-09-19 | 2014-01-14 | Marvell International Ltd. | Wireless adapter with auxiliary radio channel for advanced channel scanning |
US20100067487A1 (en) * | 2006-11-29 | 2010-03-18 | Kyocera Corporation | Wireless Communication Terminal, Hand-Off Method in Wireless Communication Terminal, and Wireless Communication System |
US8559389B2 (en) * | 2006-11-29 | 2013-10-15 | Kyocera Corporation | Wireless communication terminal, hand-off method in wireless communication terminal, and wireless communication system |
US20130235824A1 (en) * | 2007-03-21 | 2013-09-12 | Samsung Electronics Co., Ltd. | Apparatus and method for obtaining ip address of terminal using multiple frequency allocations in broadband wireless communication system |
US9585148B2 (en) * | 2007-03-21 | 2017-02-28 | Samsung Electronics Co., Ltd | Apparatus and method for obtaining IP address of terminal using multiple frequency allocations in broadband wireless communication system |
US10142270B2 (en) | 2007-06-28 | 2018-11-27 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US9674122B2 (en) | 2007-06-28 | 2017-06-06 | Vover IP LLC | Telecommunication and multimedia management method and apparatus |
US8526456B2 (en) | 2007-06-28 | 2013-09-03 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8532270B2 (en) | 2007-06-28 | 2013-09-10 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US11095583B2 (en) | 2007-06-28 | 2021-08-17 | Voxer Ip Llc | Real-time messaging method and apparatus |
US10841261B2 (en) | 2007-06-28 | 2020-11-17 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US11146516B2 (en) | 2007-06-28 | 2021-10-12 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US10511557B2 (en) | 2007-06-28 | 2019-12-17 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8565149B2 (en) | 2007-06-28 | 2013-10-22 | Voxer Ip Llc | Multi-media messaging method, apparatus and applications for conducting real-time and time-shifted communications |
US10375139B2 (en) | 2007-06-28 | 2019-08-06 | Voxer Ip Llc | Method for downloading and using a communication application through a web browser |
US10356023B2 (en) | 2007-06-28 | 2019-07-16 | Voxer Ip Llc | Real-time messaging method and apparatus |
US10326721B2 (en) | 2007-06-28 | 2019-06-18 | Voxer Ip Llc | Real-time messaging method and apparatus |
US20230051915A1 (en) | 2007-06-28 | 2023-02-16 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US11658927B2 (en) | 2007-06-28 | 2023-05-23 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8670531B2 (en) | 2007-06-28 | 2014-03-11 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8687779B2 (en) | 2007-06-28 | 2014-04-01 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8693647B2 (en) | 2007-06-28 | 2014-04-08 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US8705714B2 (en) | 2007-06-28 | 2014-04-22 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US11658929B2 (en) | 2007-06-28 | 2023-05-23 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US10158591B2 (en) | 2007-06-28 | 2018-12-18 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US20090003340A1 (en) * | 2007-06-28 | 2009-01-01 | Rebelvox, Llc | Telecommunication and multimedia management method and apparatus |
US8902749B2 (en) | 2007-06-28 | 2014-12-02 | Voxer Ip Llc | Multi-media messaging method, apparatus and application for conducting real-time and time-shifted communications |
US8948354B2 (en) | 2007-06-28 | 2015-02-03 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US12335327B2 (en) | 2007-06-28 | 2025-06-17 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US10129191B2 (en) | 2007-06-28 | 2018-11-13 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US12113761B2 (en) | 2007-06-28 | 2024-10-08 | Voxer Ip Llc | Real-time messaging method and apparatus |
US9154628B2 (en) | 2007-06-28 | 2015-10-06 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US11700219B2 (en) | 2007-06-28 | 2023-07-11 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US9800528B2 (en) | 2007-06-28 | 2017-10-24 | Voxer Ip Llc | Real-time messaging method and apparatus |
US9742712B2 (en) | 2007-06-28 | 2017-08-22 | Voxer Ip Llc | Real-time messaging method and apparatus |
US11777883B2 (en) | 2007-06-28 | 2023-10-03 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US11943186B2 (en) | 2007-06-28 | 2024-03-26 | Voxer Ip Llc | Real-time messaging method and apparatus |
US9634969B2 (en) | 2007-06-28 | 2017-04-25 | Voxer Ip Llc | Real-time messaging method and apparatus |
US9456087B2 (en) | 2007-06-28 | 2016-09-27 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US9621491B2 (en) | 2007-06-28 | 2017-04-11 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US9608947B2 (en) | 2007-06-28 | 2017-03-28 | Voxer Ip Llc | Telecommunication and multimedia management method and apparatus |
US20090003545A1 (en) * | 2007-06-28 | 2009-01-01 | Rebelvox, Llc | Telecommunication and multimedia management method and apparatus |
EP2334114A4 (en) * | 2008-09-22 | 2014-07-23 | Sharp Kk | Wireless communication system, base station device, mobile station device, and wireless communication method |
US9655080B2 (en) * | 2009-04-08 | 2017-05-16 | Sony Corporation | Wireless communication device, wireless communication system, wireless communication method and program |
US20140036725A1 (en) * | 2009-04-08 | 2014-02-06 | Sony Corporation | Wireless communication device, wireless communication system, wireless communication method and program |
US10517071B2 (en) | 2009-04-08 | 2019-12-24 | Sony Corporation | Wireless communication device, wireless communication system, wireless communication method and program |
US20100315982A1 (en) * | 2009-06-12 | 2010-12-16 | Samsung Electronics Co. Ltd. | Method and apparatus for connecting portable terminal to wlan |
EP2262326A1 (en) * | 2009-06-12 | 2010-12-15 | Samsung Electronics Co., Ltd. | Method and apparatus for connecting portable terminal to WLAN |
US9232471B2 (en) | 2009-06-12 | 2016-01-05 | Samsung Electronics Co., Ltd. | Method and apparatus for connecting portable terminal to WLAN |
EP2620004A4 (en) * | 2010-09-24 | 2017-01-25 | Intel Corporation | System and method for maintaining privacy in a wireless network |
US20120076072A1 (en) * | 2010-09-24 | 2012-03-29 | Marc Jalfon | System and method for maintaining privacy in a wireless network |
US8848670B2 (en) * | 2010-11-25 | 2014-09-30 | Sk Telecom Co., Ltd. | Authentication system and authentication method in wireless LAN environment |
US20130044733A1 (en) * | 2010-11-25 | 2013-02-21 | Sk Telecom Co., Ltd. | Authentication system and authentication method in wireless lan environment |
US20130070601A1 (en) * | 2011-09-15 | 2013-03-21 | Wistron Neweb Corp. | Method for increasing wireless networking speed, and a wireless network apparatus |
US8861365B2 (en) * | 2011-09-15 | 2014-10-14 | Wistron Neweb Corp. | Method for increasing wireless networking speed, and a wireless network apparatus |
EP2782395A4 (en) * | 2011-11-14 | 2015-06-24 | Zte Corp | METHOD AND SYSTEM FOR ROUTE OPTIMIZATION DURING TRANSFER AND ACCESS NETWORK ELEMENT |
US9572084B2 (en) | 2011-11-14 | 2017-02-14 | Zte Corporation | Method and system for route optimization during handover and access network element |
US11172434B2 (en) * | 2011-12-22 | 2021-11-09 | Electronics And Telecommunications Research Institute | Method and apparatus of scanning in wireless local area network system |
KR20210080342A (en) * | 2011-12-22 | 2021-06-30 | 한국전자통신연구원 | Method and apparatus of scanning in wireless local area network system |
KR102706310B1 (en) | 2011-12-22 | 2024-09-12 | 한국전자통신연구원 | Method and apparatus of scanning in wireless local area network system |
KR20230019918A (en) * | 2011-12-22 | 2023-02-09 | 한국전자통신연구원 | Method and apparatus of scanning in wireless local area network system |
US20190289539A1 (en) * | 2011-12-22 | 2019-09-19 | Electronics And Telecommunications Research Institute | Method and apparatus of scanning in wireless local area network system |
KR102496405B1 (en) * | 2011-12-22 | 2023-02-06 | 한국전자통신연구원 | Method and apparatus of scanning in wireless local area network system |
US20130279479A1 (en) * | 2012-04-06 | 2013-10-24 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US20130265958A1 (en) * | 2012-04-06 | 2013-10-10 | Suitable Technolgies, Inc. | System for wireless connectivity continuity and quality |
US20130343344A1 (en) * | 2012-04-06 | 2013-12-26 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US10470237B2 (en) | 2012-04-06 | 2019-11-05 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US10470235B2 (en) | 2012-04-06 | 2019-11-05 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US11659464B2 (en) | 2012-04-06 | 2023-05-23 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US9307568B2 (en) | 2012-04-06 | 2016-04-05 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US10687272B2 (en) | 2012-04-06 | 2020-06-16 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US9320074B2 (en) | 2012-04-06 | 2016-04-19 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US20130265885A1 (en) * | 2012-04-06 | 2013-10-10 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US10820259B2 (en) | 2012-04-06 | 2020-10-27 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US20130279473A1 (en) * | 2012-04-06 | 2013-10-24 | Suitable Technologies, Inc. | Method for wireless connectivity continuity and quality |
US11134434B2 (en) | 2012-04-06 | 2021-09-28 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US10939493B2 (en) | 2012-04-06 | 2021-03-02 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US10945182B2 (en) | 2012-04-06 | 2021-03-09 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US10952261B2 (en) | 2012-04-06 | 2021-03-16 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US10952262B2 (en) | 2012-04-06 | 2021-03-16 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US10966103B2 (en) | 2012-04-06 | 2021-03-30 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US10966136B2 (en) | 2012-04-06 | 2021-03-30 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US10979956B2 (en) | 2012-04-06 | 2021-04-13 | Blue Ocean Robotics Aps | Method for wireless connectivity continuity and quality |
US9320076B2 (en) | 2012-04-06 | 2016-04-19 | Suitable Technologies, Inc. | System for wireless connectivity continuity and quality |
US11039362B2 (en) | 2012-04-06 | 2021-06-15 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US11032865B2 (en) | 2012-04-06 | 2021-06-08 | Blue Ocean Robotics Aps | System for wireless connectivity continuity and quality |
US9661561B2 (en) * | 2012-04-25 | 2017-05-23 | Huawei Device Co., Ltd. | Wireless network discovery method and apparatus |
US20150043562A1 (en) * | 2012-04-25 | 2015-02-12 | Huawei Device Co., Ltd. | Wireless network discovery method and apparatus |
US11659041B2 (en) | 2012-09-24 | 2023-05-23 | Blue Ocean Robotics Aps | Systems and methods for remote presence |
WO2015123698A1 (en) * | 2014-02-17 | 2015-08-20 | Jalali Ahmad Jalali | Mobility and power management for high altitude platform (hap) communication systems |
US9742484B2 (en) | 2014-02-17 | 2017-08-22 | Ubiqomm, Inc | Provision of broadband access to airborne platforms and ground terminals using fixed satellite service and direct broadcast satellite spectra |
US9807569B2 (en) | 2014-02-17 | 2017-10-31 | Ubiqomm, Inc | Location based services provided via unmanned aerial vehicles (UAVs) |
US10341010B2 (en) | 2014-02-17 | 2019-07-02 | Bridgewest Finance Llc | Mobility and power management for high altitude platform (HAP) communication systems |
US10187140B2 (en) | 2014-02-17 | 2019-01-22 | Bridgewest Finance Llc | Unmanned aerial vehicle communication using distributed antenna placement and beam pointing |
US10299213B2 (en) | 2014-12-22 | 2019-05-21 | Qualcomm Incorporated | Methods and apparatus for enhanced power save protocol |
US20160183189A1 (en) * | 2014-12-22 | 2016-06-23 | Qualcomm Incorporated | Methods and apparatus for enhanced power save protocol |
US9955424B2 (en) * | 2014-12-22 | 2018-04-24 | Qualcomm Incorporated | Methods and apparatus for enhanced power save protocol |
US10244446B2 (en) * | 2016-04-22 | 2019-03-26 | Huawei Technologies Co., Ltd. | Triggering terminal roaming by access point |
US11019558B2 (en) * | 2016-10-25 | 2021-05-25 | Huawei Technologies Co., Ltd. | Wireless local area network association method and device, and central access point |
US11032207B2 (en) * | 2017-11-17 | 2021-06-08 | Qualcomm Incorporated | Link aggregation with floating primary link |
WO2019099268A1 (en) * | 2017-11-17 | 2019-05-23 | Qualcomm Incorporated | Link aggregation with floating primary link |
TWI761626B (en) * | 2017-11-17 | 2022-04-21 | 美商高通公司 | Method and apparatus for link aggregation with floating primary link |
CN111345063A (en) * | 2017-11-17 | 2020-06-26 | 高通股份有限公司 | Link aggregation with floating primary links |
KR20200086679A (en) * | 2017-11-17 | 2020-07-17 | 퀄컴 인코포레이티드 | Link aggregation with floating main link |
US20190158413A1 (en) * | 2017-11-17 | 2019-05-23 | Qualcomm Incorporated | Link aggregation with floating primary link |
US10911349B2 (en) | 2017-11-17 | 2021-02-02 | Qualcomm Incorporated | Link aggregation with floating primary link |
KR102295532B1 (en) | 2017-11-17 | 2021-08-27 | 퀄컴 인코포레이티드 | Link Aggregation with Floating Main Links |
US11582606B2 (en) * | 2018-08-07 | 2023-02-14 | Xi'an Yep Telecommunication Technology, Ltd. | Terminal verification method, and AP device, terminal and system |
US20230140991A1 (en) * | 2021-11-10 | 2023-05-11 | Qualcomm Incorporated | Local area network (lan) device privacy |
US11917396B2 (en) * | 2021-11-10 | 2024-02-27 | Qualcomm Incorporated | Local area network (LAN) device privacy |
Also Published As
Publication number | Publication date |
---|---|
CN102395170A (en) | 2012-03-28 |
US7864732B2 (en) | 2011-01-04 |
TW200733773A (en) | 2007-09-01 |
US20110069677A1 (en) | 2011-03-24 |
DE102007002077B4 (en) | 2013-08-08 |
US8442008B2 (en) | 2013-05-14 |
JP2007221778A (en) | 2007-08-30 |
TWI339992B (en) | 2011-04-01 |
CN102395170B (en) | 2014-06-18 |
CN101014041B (en) | 2012-01-04 |
CN101014041A (en) | 2007-08-08 |
JP4635014B2 (en) | 2011-02-16 |
DE102007002077A1 (en) | 2007-08-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7864732B2 (en) | Systems and methods for handoff in wireless network | |
EP1414262B1 (en) | Authentication method for fast handover in a wireless local area network | |
EP1639756B1 (en) | Facilitating 802.11 roaming by pre-establishing session keys | |
US8037305B2 (en) | Securing multiple links and paths in a wireless mesh network including rapid roaming | |
EP2145406B1 (en) | Method for handover between heterogeneous radio access networks | |
CN107690138B (en) | Fast roaming method, device, system, access point and mobile station | |
US7263357B2 (en) | Method for fast roaming in a wireless network | |
US20060013398A1 (en) | Method and system for pre-authentication | |
US20100040016A1 (en) | Wireless Network Handoff Method and Mobile Device Using Same | |
KR20090005971A (en) | How to set up fast security association for handover between heterogeneous networks | |
US11310724B2 (en) | Key management for fast transitions | |
KR20100065671A (en) | High speed handover method in the wireless lan having a plurality of mobility domain | |
Martinovic et al. | Measurement and analysis of handover latencies in IEEE 802.11 i secured networks | |
KR100991169B1 (en) | Fast Handover Method in Wireless LAN and Mobile Terminal Using the Same | |
Chen et al. | A seamless handoff mechanism for DHCP-based IEEE 802.11 WLANs | |
KR101197281B1 (en) | Integarated mobility management server and method for supporting mobility in the network management system based on wireless communication network | |
Nankani | Horizontal Handoffs within WLANs: A detailed analysis and measurement concerning voice like traffic | |
Duong et al. | Proactive Key Delivery for Fast Authentication in WLAN-based Access Networks |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: MEDIATEK INC., TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LO, PANG HSIANG;TSAO, SHIAO-LI;SIGNING DATES FROM 20061020 TO 20061030;REEL/FRAME:018681/0580 Owner name: MEDIATEK INC., TAIWAN Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LO, PANG HSIANG;TSAO, SHIAO-LI;REEL/FRAME:018681/0580;SIGNING DATES FROM 20061020 TO 20061030 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552) Year of fee payment: 8 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |